Showing 1 - 20 results of 111 for search '"СЕТЕВАЯ БЕЗОПАСНОСТЬ"', query time: 0.85s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
    Academic Journal

    Source: «System analysis and applied information science»; № 3 (2023); 48-54 ; Системный анализ и прикладная информатика; № 3 (2023); 48-54 ; 2414-0481 ; 2309-4923 ; 10.21122/2309-4923-2023-3

    File Description: application/pdf

    Relation: https://sapi.bntu.by/jour/article/view/629/475; Karri, R.; Rajendran, J.; Rosenfeld, K.; Tehranipoor, M. Trustworthy Hardware: Identifying and Classifying Hardware Trojans. Computer; 2010; 43, pp. 39-46. DOI: https://dx.doi.org/10.1109/MC.2010.299; Weforum. Available online: https://www.weforum.org/agenda/2019/12/our-hardware-is-under-cyberattack-heres-how- to-make-it-safe/ (accessed on 1 January 2023).; Tehranipoor, M.; Wang, C. Introduction to Hardware Security and Trust; Springer Science & Business Media: Berlin/ Heidelberg, Germany, 2011.; McGraw, G. Building secure software: Better than protecting bad software. IEEE Softw.; 2002; 19, pp. 57-58. DOI: https://dx.doi.org/10.1109/MS.2002.1049391; Aslan, Ö. How to decrease cyber threats by reducing software vulnerabilities and bugs. Proceedings of the 1st International Mediterranean Science and Engineering Congress, Çukurova University; Adana, Turkey, 26–28 October 2016; pp. 639-646.; Aslan, O.; Samet, R. Mitigating Cyber Security Attacks by Being Aware of Vulnerabilities and Bugs. Proceedings of the IEEE 2017 International Conference on Cyberworlds; Chester, UK, 20–22 September 2017; pp. 222-225. DOI: https://dx.doi.org/10.1109/cw.2017.22; Techsurface. Available online: http://techsurface.com/2010/01/microsoft-security-development-lifecycle-sdl.html (accessed on 1 January 2023).; Broadcom. Available online: https://docs.broadcom.com/docs/istr-21-2016-en/ (accessed on 1 January 2023).; Mcafee. Available online: https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threat-report-2019.pdf (accessed on 1 January 2023).; Padhy, R.P.; Manas, R.P.; Suresh, C.S. Cloud computing: Security issues and research challenges. Int. J. Comput. Sci. Inf. Technol. Secur.; 2011; 1, pp. 136-146.; Alcaraz, C.; Zeadally, S. Critical infrastructure protection: Requirements and challenges for the 21st century. Int. J. Crit. Infrastruct. Prot.; 2015; 8, pp. 53-66. DOI: https://dx.doi.org/10.1016/j.ijcip.2014.12.002; Lipso, H.F. Tracking, and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues; Carnegie-Mellon University: Pittsburgh, PA, USA, 2002.; Ramirez, J.H.P. An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and Evaluation. PhD Thesis; The University of Arizona: Tucson, AZ, USA, 2017.; Trend Micro. Available online: http://blog.trendmicro.com/trendlabs-security-intelligence/operation-woolen-goldfish-when-kittens-go-phishing/ (accessed on 1 January 2023).; Info Security Group. Available online: http://www.infosecurity-magazine.com/news/potao-trojan-served-up-by-russian/ (accessed on 1 January 2023).; Litefinance. Available online: https://www.litefinance.com/blog/for-professionals/cryptocurrency-exchange-hacks-history-causes-and-effects/ (accessed on 1 January 2023).; BBC: News. Available online: https://www.bbc.com/news/world-asia-42845505 (accessed on 1 January 2023).; https://sapi.bntu.by/jour/article/view/629

  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20